Sciweavers

502 search results - page 83 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
ICNS
2009
IEEE
14 years 2 months ago
Advanced Hash Algorithms with Key Bits Duplication for IP Address Lookup
Hashing technique have been widely adopted for various computer network applications such as IP address lookup and intrusion detection, among which XOR-hashing is one of most popu...
Christopher J. Martinez, Wei-Ming Lin
MOBIHOC
2010
ACM
13 years 5 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling
ICIP
2002
IEEE
14 years 9 months ago
An improved error control paradigm for multimedia transmission over wireless networks
Providing quality-of-service (QoS) guarantees over wireless packet networks requires thorough understanding and quantification of the interactions among the traffic source, the wi...
Mohamed F. Mansour, Abed Elhamid Lawabni, Ahmed H....
INFOCOM
2010
IEEE
13 years 5 months ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu
EUROGP
2005
Springer
115views Optimization» more  EUROGP 2005»
14 years 1 months ago
Genetic Programming in Wireless Sensor Networks
Abstract. Wireless sensor networks (WSNs) are medium scale manifestations of a paintable or amorphous computing paradigm. WSNs are becoming increasingly important as they attain gr...
Derek M. Johnson, Ankur Teredesai, Robert T. Salta...